A system and method for bridging requests for access to resources between
requestors in a distributed network and an authenticator servicing the
distributed network is provided. The bridging mechanism has security
features including a naming service for machine authentication and
machine process rules to authorize what process machines can perform. The
security proxy bridge intercepts an access request, and checks the IP
address for machine authentication as well as the machine process rules
and if both verifications are successful, the bridge then forwards the
request for access to the authenticator. The security proxy framework
utilizes a data structure that provides a method for storing selected
security information stored as data records supporting an authentication
and authorization system for users to access resources on multiple
components of a distributed network supporting multiple business units of
an enterprise. Primary authentication information stored herein includes
general user information, security, and contact information.